conduct lateral movement attack by leveraging unfiltered services display name to smuggle binaries as chunks into the target machine
☆54Jun 14, 2021Updated 4 years ago
Alternatives and similar repositories for TChopper
Users that are interested in TChopper are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆113Sep 15, 2022Updated 3 years ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- How to spoof the command line when spawning a new process from C#.☆111Dec 28, 2021Updated 4 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- ☆15Jul 20, 2022Updated 3 years ago
- Proof of Concept Utilities Developed to Research NTLM Relaying Attacks Targeting ADFS☆186Jun 22, 2022Updated 3 years ago
- ☆50May 12, 2021Updated 4 years ago
- Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly☆90Sep 30, 2024Updated last year
- Pascal Offsec repo for malware dev and red teaming 🚩☆190Oct 13, 2023Updated 2 years ago
- Simple executable generator with encrypted shellcode.☆281Oct 3, 2022Updated 3 years ago
- TWinEventHook allows you to hook into certain Windows events.☆11Sep 20, 2019Updated 6 years ago
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆222Aug 12, 2022Updated 3 years ago
- A PoC project for embedding shellcode to Hint/Name Table☆114May 16, 2022Updated 3 years ago
- Similar to Petitpotam, the netdfs service is enabled in Windows Server and AD environments, and the abused RPC method allows privileged p…☆49Jun 21, 2022Updated 3 years ago
- Retrieve LAPS password from LDAP☆437Feb 17, 2021Updated 5 years ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- Running .NET from VBA☆148Feb 11, 2023Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Sep 24, 2021Updated 4 years ago
- ☆133Jul 14, 2021Updated 4 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- nuke that event log using some epic dinvoke fu☆118May 12, 2021Updated 4 years ago
- Process Monitor filter for finding privilege escalation vulnerabilities on Windows☆79Jun 9, 2021Updated 4 years ago
- Windows shellcode encoding and encrypting tool☆20May 4, 2022Updated 3 years ago
- Resolve syscall numbers at runtime for all Windows versions.☆59Nov 21, 2024Updated last year
- A C# tool with more flexibility to customize scheduled task for both persistence and lateral movement in red team operation☆345Jan 22, 2025Updated last year
- Out-of-the-Box Tool to Obfuscate Excel XLS. Include Obfuscation & Hide for Cell Labels & BoundSheets☆48Aug 4, 2021Updated 4 years ago
- Change background wallpaper image in Windows 11/10/8/7 and older via Win32 in Delphi.☆12Nov 10, 2021Updated 4 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Mar 27, 2022Updated 3 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Get fresh Syscalls from a fresh ntdll.dll copy☆234Jan 28, 2022Updated 4 years ago
- Random☆35Nov 30, 2022Updated 3 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Pass the Hash to a named pipe for token Impersonation☆145May 1, 2021Updated 4 years ago
- gundog - guided hunting in Microsoft Defender☆52Apr 29, 2021Updated 4 years ago
- A collection of offensive Nim example code☆74Dec 21, 2021Updated 4 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- A collection of proof-of-concept source code and scripts for executing remote commands over WinRM using the WSMan.Automation COM object☆258May 12, 2020Updated 5 years ago